US9514023B2 - Message flow control in a multi-node computer system - Google Patents

Message flow control in a multi-node computer system Download PDF

Info

Publication number
US9514023B2
US9514023B2 US12/144,783 US14478308A US9514023B2 US 9514023 B2 US9514023 B2 US 9514023B2 US 14478308 A US14478308 A US 14478308A US 9514023 B2 US9514023 B2 US 9514023B2
Authority
US
United States
Prior art keywords
node
message flow
flow control
logging
control policy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US12/144,783
Other versions
US20090319621A1 (en
Inventor
Eric L. Barsness
David L. Darrington
Amanda Peters
John M. Santosuosso
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US12/144,783 priority Critical patent/US9514023B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DARRINGTON, DAVID L, BARSNESS, ERIC L, SANTOSUOSSO, JOHN M, PETERS, AMANDA
Publication of US20090319621A1 publication Critical patent/US20090319621A1/en
Application granted granted Critical
Publication of US9514023B2 publication Critical patent/US9514023B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0721Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment within a central processing unit [CPU]
    • G06F11/0724Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment within a central processing unit [CPU] in a multiprocessor or a multi-core unit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • G06F11/0781Error filtering or prioritizing based on a policy defined by the user or on a policy defined by a hardware/software module, e.g. according to a severity level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • G06F11/3433Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment for load management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3471Address tracing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/86Event-based monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/88Monitoring involving counting

Definitions

  • Embodiments of the invention relate to multi-node computing systems.
  • Powerful computers may be designed as highly parallel systems where the processing activity of thousands of processors (CPUs) is coordinated to perform computing tasks. These systems are highly useful for a broad variety of applications, including financial modeling, hydrodynamics, quantum chemistry, astronomy, weather modeling and prediction, geological modeling, prime number factoring, and image processing (e.g., CGI animations and rendering), to name but a few examples.
  • Blue Gene® For example, one family of parallel computing systems has been (and continues to be) developed by International Business Machines (IBM) under the name Blue Gene®.
  • the Blue Gene/L architecture provides a scalable, parallel computer that may be configured with a maximum of 65,536 (2 16 ) compute nodes. Each compute node includes a single application specific integrated circuit (ASIC) with 2 CPU's and memory.
  • ASIC application specific integrated circuit
  • the Blue Gene/L architecture has been successful and on Oct. 27, 2005, IBM announced that a Blue Gene/L system had reached an operational speed of 280.6 teraflops (280.6 trillion floating-point operations per second), making it the fastest computer in the world at that time. Further, as of June 2005, Blue Gene/L installations at various sites world-wide were among five out of the ten top most powerful computers in the world.
  • One requirement for a cluster computer system is to provide for monitoring consistency and operational capability of the system and its applications.
  • it is useful to log functioning of compute nodes of the cluster computer system and trace executing applications running on the compute nodes and report any detected errors and/or failures.
  • developers may use tracing information, such as tracing messages, for debugging applications running on the compute nodes, while administrators may use logging information, such as logging events, for diagnostic and auditing of the system.
  • tracing information such as tracing messages
  • logging information such as logging events
  • One embodiment of the invention provides a method for controlling message flow in parallel computing system having multiple compute nodes.
  • the method may generally include assigning a set of compute nodes of the system to a node pool and assigning a message flow control policy to the nodes in the node pool.
  • the message flow control policy may specify logging and/or tracing activities to be performed by an instance of an application running on one or more compute nodes in the node pool.
  • the method may further include initiating execution of the application running on the compute nodes in the node pool and, while executing the application, generating one or more tracing and/or logging messages on the one or more compute nodes according to the message flow control policy.
  • Another embodiment of the invention includes a computer readable storage medium containing a program which, when executed by a processor, performs an operation for controlling message flow in parallel computing system having multiple compute nodes.
  • the operation may generally include assigning a set of compute nodes of the system to a node pool and assigning a message flow control policy to the nodes in the node pool.
  • the message flow control policy may specify logging and/or tracing activities to be performed by an instance of an application running on one or more compute nodes in the node pool.
  • the operation may further include initiating execution of the application running on the compute nodes in the node pool and, while executing the application, generating one or more tracing and/or logging messages on the one or more compute nodes according to the message flow control policy.
  • Still another embodiment of the invention includes a parallel computing system.
  • the system may generally include a plurality of compute nodes, each having at least a processor and a memory. Each of compute nodes is configured to execute a parallel computing application.
  • the system may also include a service node having at least a processor, a memory, and a tracing-logging control program for controlling message flow in the parallel computing system.
  • the tracing-logging control program may generally be configured to assign a set of compute nodes to a node pool.
  • a message flow control policy is assigned to each compute node of the node pool.
  • the message flow control policy may specify at least one logging and/or tracing activity to be performed by an instance of an application running on one or more computes node assigned to the node pool.
  • the tracing-logging control program may be further configured to initiate execution of the application on each of the compute nodes in the node pool.
  • the one or more compute node are configured to generate, while executing the application, one or more logging or tracing messages according to the first message flow control policy.
  • FIG. 1 is a block diagram illustrating components of a massively parallel computer system, according to one embodiment of the invention.
  • FIG. 2 is an illustration of a three-dimensional torus network of system, according to one embodiment of the invention.
  • FIG. 3 illustrates components of a compute node of the system of FIG. 1 , according to one embodiment of the invention.
  • FIG. 4 is a flowchart illustrating a method for controlling a message flow in a multi-node system, according to one embodiment of the invention.
  • FIGS. 5A and 5B illustrate a selective grouping of compute nodes in a multi-node system, according to one embodiment of the invention.
  • Embodiments of the invention enable the system to decrease a message flow, which includes tracing/logging data, across the system without compromising monitoring consistency and operational capability of the system and its applications. This may be done by grouping compute nodes of the system into node pools and processing errors jointly for each node pool according to pre-defined error-control policies.
  • One embodiment of the invention is implemented as a program product for use with a computer system.
  • the program(s) of the program product defines functions of the embodiments (including the methods described herein) and can be contained on a variety of computer-readable storage media.
  • Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive) on which information is permanently stored; (ii) writable storage media (e.g., floppy disks within a diskette drive or hard-disk drive) on which alterable information is stored.
  • Such computer-readable storage media when carrying computer-readable instructions that direct the functions of the invention, are embodiments of the invention.
  • Other media include communications media through which information is conveyed to a computer, such as through a computer or telephone network, including wireless communications networks. The latter embodiment specifically includes transmitting information to/from the Internet and other networks.
  • Such communications media when carrying computer-readable instructions that direct the functions of the invention, are embodiments of the invention.
  • computer-readable storage media and communications media may be referred to herein as computer-readable media.
  • routines executed to implement the embodiments of the invention may be part of an operating system or a specific application, component, program, module, object, or sequence of instructions.
  • the computer program of the invention typically is comprised of a multitude of instructions that will be translated by the native computer into a machine-readable format and hence executable instructions.
  • programs are comprised of variables and data structures that either reside locally to the program or are found in memory or on storage devices.
  • various programs described hereinafter may be identified based upon the application for which they are implemented in a specific embodiment of the invention. However, it should be appreciated that any particular program nomenclature that follows is used merely for convenience, and thus, the invention should not be limited to use solely in any specific application identified and/or implied by such nomenclature.
  • FIG. 1 is a block diagram illustrating components of a massively parallel computer system 100 , according to one embodiment of the invention.
  • the computer system 100 shows the high-level architecture of an IBM Blue Gene® computer system.
  • IBM Blue Gene® IBM Blue Gene®
  • other parallel computer systems could be used, and the description of a preferred embodiment herein is not intended to limit the invention.
  • the computer system 100 includes a compute core 101 having a plurality of compute nodes 112 arranged in a regular array or matrix.
  • the compute nodes 112 perform the useful work performed by the computer system 100 .
  • the operation of the computer system 100 may be controlled by a service node 102 .
  • Various additional processors in front-end nodes 103 may perform auxiliary data processing functions, and file servers 104 provide an interface to data storage devices such as disk based storage 109 A, 109 B or other I/O operations.
  • a functional network 105 provides the primary data communication path among the compute core 101 and other system components. For example, data stored in storage devices attached to the file servers 104 is loaded and stored to other system components through the functional network 105 .
  • the compute core 101 includes I/O nodes 111 A-C and compute nodes 112 A-I.
  • the compute nodes 112 provide the processing capacity of the parallel computer system 100 , and are configured to execute applications written for parallel processing.
  • the I/O nodes 111 handle I/O operations on behalf of the compute nodes 112 .
  • the I/O node 111 may retrieve data from the file servers 104 requested by one of compute nodes 112 .
  • Each I/O node 111 may include a processor and interface hardware that handles I/O operations for a set of N compute nodes 112 , the I/O node and its respective set of N compute nodes are referred to as a Pset.
  • the compute core 101 contains M Psets 115 A-C, each including a single I/O node 111 and N compute nodes 112 , for a total of M ⁇ N compute nodes 112 .
  • the I/O nodes are connected to the functional network 105 , over which they communicate with I/O devices, attached to file servers 104 , or with other system components.
  • the local I/O tree networks 113 may be viewed logically as extensions of the functional network 105 , and like the functional network 105 , are used for data I/O, although they are physically separated from the functional network 105 .
  • the service node 102 may be configured to direct the operation of the compute nodes 112 in the compute core 101 .
  • the service node 102 is a computer system that includes a processor (or processors) 121 , internal memory 120 , and local storage 130 .
  • An attached console 107 i.e., a keyboard, mouse, and display
  • the service node 102 may also include an internal database which maintains state information for the compute nodes in the compute core 101 , and an application which may be configured to, among other things, control the allocation of hardware in the compute core 101 , direct the loading of data on the compute nodes 112 , migrate process running on one of the compute nodes 112 to another one of the compute nodes 112 , and perform diagnostic and maintenance functions.
  • memory 120 also includes a messaging-control policies holder (MCPH) 122 , a tracing/logging controller 123 , a tracing/logging parser 124 , and a log 125 .
  • the tracing/logging controller 123 is configured to group the compute nodes 112 into node pools and to apply the messaging-control policies of MCHP 122 , such as error-control policies (described below in greater detail) to the compute nodes 112 .
  • the tracing/logging controller 123 is also configured to analyze messages generated by the compute nodes 112 (e.g., to determine how many messages are generated, what time, by which nodes, and so on) and, based on the results of such analysis, adjust/amend the messaging-control policies of MHPC 122 .
  • Such an arrangement allows for dynamic adjustment of the policies to current functioning of the computer system 100 , and thus provides for better message flow control.
  • the tracing/logging parser 124 may parse content of the messages, e.g., to identify duplicate messages and provide the parsing results to the tracing/logging controller 123 , which in turn may amend the policies of MCHP 122 applied to the node pools.
  • the log 125 is configured to store tracing messages and/or logging events, such as error messages, and may be used by both, the tracing/logging controller 123 and the tracing/logging parser 124 . It should be noted that not every embodiment includes the tracing/logging parser 124 .
  • the tracing/logging controller 123 may also be configured to perform the functions of the tracing/logging parser described above.
  • embodiment messages content simply is not parsed.
  • the tracing/logging controller 123 and parser 124 need not reside on the service node 102 . Instead, controller 123 and parser 124 may reside on one or more of the compute nodes.
  • the service node 102 communicates control and state information to the nodes of the compute core 101 over a control system network 106 .
  • the control network 106 is coupled to a set of hardware controllers 108 A-C. Each hardware controller communicates with nodes of a respective Pset 115 over a corresponding local hardware control network 114 A-C.
  • the hardware controllers 108 and local hardware control networks 114 are logically an extension of the control system network 106 , although physically separate.
  • the control system network 106 may include a JTAG (Joint Test Action Group) network, configured to provide a hardware monitoring facility.
  • JTAG Joint Test Action Group
  • JTAG is a standard for providing external test access to integrated circuits serially, via a four- or five-pin external interface.
  • the JTAG standard has been adopted as an IEEE standard.
  • the JTAG network may be used to send performance counter data to the service node 102 in real-time. That is, while an application is running on the compute core 101 , network performance and/or network state data may be gathered and transmitted to service node 102 without affecting the performance of that application.
  • network performance and/or network state data may be gathered and transmitted to service node 102 without affecting the performance of that application.
  • other hardware monitoring facilities may be used.
  • the front-end nodes 103 provide computer systems used to perform auxiliary functions which, for efficiency or otherwise, are best performed outside the compute core 101 . Functions which involve substantial I/O operations are generally performed in the front-end nodes 103 . For example, interactive data input, application code editing, or other user interface functions are generally handled by the front-end nodes 103 , as is application code compilation or application debugging.
  • the front-end nodes 103 are also connected to the functional network 105 and may communicate with the file servers 104 .
  • compute nodes 112 may be logically arranged in a three-dimensional torus, where each compute node 112 may be identified using an x, y and z coordinate.
  • FIG. 2 is a conceptual illustration of a three-dimensional torus network of a computer system 100 , according to one embodiment of the invention. More specifically, FIG. 2 illustrates a 4 ⁇ 4 ⁇ 4 torus 201 of compute nodes, in which the interior nodes are omitted for clarity. Although FIG. 2 shows a 4 ⁇ 4 ⁇ 4 torus having 64 nodes, it will be understood that the actual number of compute nodes in a parallel computing system is typically much larger. For example, a Blue Gene/L system may be configured with 65,536 compute nodes 112 along with and an additional 1024 I/O nodes 111 .
  • each compute node 112 in the torus 201 includes a set of six node-to-node communication links 202 A-F which allows each compute nodes in the torus 201 to communicate with its six immediate neighbors, two nodes in each of the x, y and z coordinate dimensions.
  • the term “torus” includes any regular pattern of nodes and inter-nodal data communications paths in more than one dimension, such that each node has a defined set of neighbors, and for any given node, it is possible to determine the set of neighbors of that node.
  • a “neighbor” of a given node is any node which is linked to the given node by a direct inter-nodal data communications path. That is, a path which does not have to traverse another node.
  • the compute nodes may be linked in a three-dimensional torus 201 , as shown in FIG. 2 , but may also be configured to have more or fewer dimensions. Also, it is not necessarily the case that a given node's neighbors are the physically closest nodes to the given node, although it is generally desirable to arrange the nodes in such a manner, insofar as possible.
  • the compute nodes in any one of the x, y, or z dimensions form a torus in that dimension because the point-to-point communication links logically wrap around.
  • this is represented in FIG. 2 by links 202 D, 202 E, and 202 F which wrap around from a compute node 203 to other end of the compute core 201 in each of the x, y and z dimensions.
  • node-to-node links 202 A-F link the node 203 to the nodes 204 , 205 , and 206 , in the x, y, and Z dimensions of the torus 201 .
  • FIG. 3 illustrates components of a compute node 112 of the computer system 100 of FIG. 1 , according to one embodiment of the invention.
  • the compute node 112 includes processor cores 301 A and 301 B, each having an instruction address register 306 A and 306 B.
  • the compute node 112 also includes memory 302 used by both processor cores 301 ; an external control interface 303 which is coupled to a local hardware control network 114 (e.g., the control system network 106 ); an external data communications interface 304 which is coupled to the corresponding local I/O tree network 113 and the corresponding six node-to-node links 202 of the torus network 201 ; and includes monitoring and control logic 305 which receives and responds to control commands received through external control interface 303 .
  • the monitoring and control logic 305 may access the processor cores 301 and locations in the memory 302 on behalf of the service node 102 to read (or in some cases alter) the operational state of the compute node 112 .
  • each compute node 112 may be physically implemented as a single integrated circuit.
  • the functional network 105 may service many I/O nodes 111 , and each I/O node 111 is shared by a group of compute nodes 112 (i.e., a Pset).
  • a group of compute nodes 112 i.e., a Pset.
  • the memory 302 stores an operating system image 311 .
  • the operating system image 311 provides a copy of a simplified-function operating system running on the compute node 112 , referred to as a compute node kernel (CNK).
  • CNK 311 provides a minimal set of functions required to support operation of the compute node 112 .
  • CNK 311 One functionality provided by the CNK 311 is to forwards system calls of the compute node 112 for service.
  • a separate process running on the corresponding I/O node 111 namely CIOD, services system calls on behalf of CNK 311 .
  • I/O system requests initiated by a user application 312 running on the compute node 112 e.g., open, close, read, write, etc.
  • CNK 311 also supports a service connection providing a trace facility and status reporting for the compute nodes 112 .
  • the trace output allows seeing the flow of control through the running CIOD.
  • the status reporting allows seeing current states of various objects maintained by CIOD and the compute nodes 112 .
  • a tracing/logging component 313 may reside in the memory 302 .
  • the tracing/logging controller 123 of the service node 102 directs the tracing/logging component 313 to implement the messaging-control policies of MCHP 122 (such as error-control polices) corresponding to the compute node 112 .
  • the tracing/logging component 313 may disable a certain error processing.
  • application 312 may be configured with multiple logging levels or tracing configurations, (e.g., error processing of errors having severity level ranging from 1-5, where 1 represents a minimal level of logging and 5 represents a maximum verbosity in logging; error processing of errors having severity level ranging from 1-5, where 1 represents least critical errors, such as correctable errors, and 5 represents most critical errors, such as fatal errors).
  • the tracing/logging controller 123 may set different logging levels for multiple nodes running a respective copy of application 312 . This allows for at least some nodes to execute the application 312 with a great deal of logging activity, while other nodes perform only a minimal degree of logging.
  • the logging on the node set to a maximal logging level may provide logging data representative of logging on all the applications.
  • the tracing/logging controller 123 may activate tracing features for only a few nodes running the same application and use the information from those nodes as being representative of overall application performance.
  • An alternative scenario includes assigning the same level of tracing and/or logging to multiple compute nodes, but doing so for different components of an application 312 . Doing so allows the cost of debugging/logging functions to be distributed across multiple compute nodes.
  • the tracing/logging component 313 may intercept messages of a certain type (e.g., info messages) from the compute node 112 , so messages of this type are not transmitted across the computer system 100 .
  • FIG. 4 illustrates a method 400 for controlling message flow across the computer system 100 , according to one embodiment of the invention.
  • the method 400 begins at step 405 .
  • the compute nodes of the computer system 100 are grouped into node pools, where each node pool contains a plurality of compute nodes. Such grouping is performed in such a manner that errors logged/traced by the applications running on a node in a given node pool are analyzed together. This allows modifying error processing for the compute nodes within the node pool in such a way that necessary and/or representative error data continues to be generated and analyzed, while duplicate or unimportant error data may be omitted. Consequently, the resources of the computer system 100 are conserved and may be used by the system for other purposes.
  • the compute nodes assigned to one node pool execute the same user application.
  • the compute nodes may run different user applications, not be connected to each other.
  • some of the compute nodes may be assigned to several node pools, while other compute nodes are not assigned to any of the node pools.
  • an error-control policy defines tracing characteristics of the nodes within a node pool.
  • an error-control policy may define a type of error processing (e.g., INFO, ERROR, CONFIG, and so on), error severity level (e.g., 1-5), specific error (e.g., such as error specific to a particular user application running on the compute nodes 112 assigned to the node pool).
  • the error-control policy may further define how the defined type of error processing should be used in a particular node pool. For example, the error-control policy may specify that error processing should be disabled/turned on for errors of a certain type, certain error severity level, or specific error (e.g., disable error processing of errors having an error severity level of 2).
  • the error-control policy may further specify whether error processing should be disabled only for one node, all nodes, or a certain number of nodes in the node pool (e.g., disable error processing of errors having severity level of 2 for all compute nodes in the node pool except one; disable error processing of the “Info” type errors for every compute node in the node pool, turn on error processing of errors of any kind for a certain compute node in the node pool; and so on).
  • the error-control policy may specify that no error messages should be transmitted from nodes of the node pool, though the error messages continue to be generated. Because the messages are not transmitted, resources of the computer system 100 are conserved. Optionally, such messages may be combined and locally logged, so they may be accessed when and if needed.
  • the error-control policies applied to the node pools differ between the node pools as doing so allows error processing/logging to be distributed across compute nodes 112 .
  • this is not necessarily the case.
  • two node pools including compute nodes 112 each running a different user application may be assigned similar error-control policies (such as turning off all error processing for each compute node 112 except a subset of one or more nodes in the pool).
  • an error-control policy includes only one condition (such as turn off an error processing of a certain kind for certain nodes in a node pool), while multiple conditions (such as turning off two kinds of error processing) may be applied to the same set of the compute nodes by assigning that set of compute nodes to multiple pools.
  • each node pool may be assigned a different error-control for the set of compute nodes.
  • one node pool may be used for each set of the compute nodes 112 where the corresponding error-control policy includes multiple conditions applicable to that set of the compute nodes.
  • the error-message flow of the computer system 100 may be analyzed (step 420 ) to determine whether any of the error-control policies need to be amended and/or any compute nodes should be assigned to new node pools. For example, if it is determined that none of the error-messages describing errors of a kind described by an error-control policy are generated from a node pool to which the error-control policy is assigned, such an error-control policy may be amended (step 435 ).
  • One possible amendment of an error-control policy is changing an error condition defined by the error-control policy (e.g., changing the error severity level from 1 to 2; changing the error type from “Info” to “Config;” and so on).
  • Another possible error-control policy amendment is changing the compute node(s) to which the policy is applied (e.g., turning error processing on one compute node and disabling the same kind of error processing on another compute node). It should be noted that when an error-control policy has been amended, tracing characteristics of the compute nodes assigned to a node pool having this error-control policy change to correspond to the amended error-control policy.
  • a compute node in one node pool may be re-assigned to the node pool where the compute nodes generate similar errors.
  • a compute node may be assigned to a new pool, its tracing characteristic change to correspond to the error-control policy assigned to that new pool.
  • error-control policy amendments or node switching are not necessarily based on the results of the error-message flow analysis. Changes in the computer system 100 (e.g., new user application installed on some of the compute nodes) may also be used to amend the error-control policies or assign nodes to new node pools, even when the error-message flow has not been analyzed.
  • the content of an error-message may optionally be used to determine whether duplicate error messages are being generated or transmitted across the computer system 100 .
  • an error-message e.g., an error id and description
  • certain measures may be taken to avoid processing such messages unnecessarily.
  • the duplicate messages are not transmitted over the computer system 100 , but instead collected and logged locally. Later, a condensed summary of the error messages may be generated. Such a summary may include the duplicate error-message content and, optionally, description of the compute nodes that have caused generation of the duplicate error-messages.
  • discovery of the duplicate messages may cause error-control policies to be modified or a node being assigned to another node pool.
  • the compute nodes generating duplicate error-messages may be assigned to the same node pool.
  • one compute node in the node pool may be selected and an error-control policy may be created. This error-control policy would turn off error processing causing the duplicate messages to be generated for every compute node in the node pool except for the previously selected compute node.
  • the method 400 ends at step 445 .
  • FIGS. 5A and 5B illustrate a selective grouping of compute nodes 112 in the parallel computer system 100 , according to one embodiment of the invention.
  • FIGS. 5A and 5B illustrate 16 compute nodes of the computer system 100 , namely compute nodes 0 through 15 which are assigned to three node pools; namely node pools 510 , 520 , and 530 .
  • a messaging-control policy applied to the node pool 510 specifies that only tracing messages having an “info” type should be generated (and/or reported) by the nodes of the pool 510 .
  • a messaging-control policy applied to the node pool 520 provides that only a certain kind of error messages may be generated by the compute nodes of the node pool 520 ; namely error messages having a hypothetical error severity level of “2.”
  • An error-control policy applied to the node pool 530 specifies that only one compute node in the node pool 530 ; namely, node 11 , should perform generate and or report error messages (e.g., logging/tracing messages) while the error processing for other compute nodes in the node pool 530 is disabled.
  • the node pool 520 includes nodes 10 , 11 , 14 , and 15 .
  • the node pools 510 and 530 differ between FIGS. 5A and 5B .
  • nodes 0 and 1 are included in the node pool 510 in FIG. 5A and in the node pool 530 in FIG. 5B .
  • FIGS. 5A and 5B show that nodes 0 and 1 have been re-assigned from node pool 510 to the node pool 530 in FIG. 5B .
  • embodiments of the invention enable controlling a message flow across multiple compute nodes of a highly-parallel system. For example, by grouping the compute nodes into node pools and allowing a certain kind of error of processing only for one node in a node pool while disabling such error processing for the other nodes in the node pool, message flow across the system may be significantly decreased without compromising monitoring consistency and operational capability of the system and its applications. Further, in one embodiment, upon determining that duplicate messages are generated, the duplicate messages are prevented from transmitting across the system and a condensed summary of the duplicate messages is provided instead. Doing so frees memory and processing resources of the system and reduces the amount of the system monitoring.

Abstract

Embodiments of the invention provide for controlling message flow across a parallel computer system having multiple compute nodes by selectively grouping compute nodes of such a system into node pools and assigning message flow control policies to nodes in the node pools. The message flow control policies specify logging and/or tracing activities to be performed by instances of applications running on nodes assigned to the node pools. As the application is executed, logging and/or tracing messages are generated on the compute nodes according to message flow control policies assigned to the nodes. Optionally, the message flow is analyzed, the message flow control policies are adjusted, and duplicate messages are eliminated.

Description

BACKGROUND OF THE INVENTION
Field of the Invention
Embodiments of the invention relate to multi-node computing systems.
Description of the Related Art
Powerful computers may be designed as highly parallel systems where the processing activity of thousands of processors (CPUs) is coordinated to perform computing tasks. These systems are highly useful for a broad variety of applications, including financial modeling, hydrodynamics, quantum chemistry, astronomy, weather modeling and prediction, geological modeling, prime number factoring, and image processing (e.g., CGI animations and rendering), to name but a few examples.
For example, one family of parallel computing systems has been (and continues to be) developed by International Business Machines (IBM) under the name Blue Gene®. The Blue Gene/L architecture provides a scalable, parallel computer that may be configured with a maximum of 65,536 (216) compute nodes. Each compute node includes a single application specific integrated circuit (ASIC) with 2 CPU's and memory. The Blue Gene/L architecture has been successful and on Oct. 27, 2005, IBM announced that a Blue Gene/L system had reached an operational speed of 280.6 teraflops (280.6 trillion floating-point operations per second), making it the fastest computer in the world at that time. Further, as of June 2005, Blue Gene/L installations at various sites world-wide were among five out of the ten top most powerful computers in the world.
One requirement for a cluster computer system, such as Blue Gene/L system, is to provide for monitoring consistency and operational capability of the system and its applications. Thus, it is useful to log functioning of compute nodes of the cluster computer system and trace executing applications running on the compute nodes and report any detected errors and/or failures. For example, developers may use tracing information, such as tracing messages, for debugging applications running on the compute nodes, while administrators may use logging information, such as logging events, for diagnostic and auditing of the system. However, for such information to be useful, numerous messages/events related to functioning of the compute nodes and executing of the applications have to be generated, transmitted, and stored. As number of compute nodes in a cluster computer system grows, generating, transmitting, collecting, and/or storing tracing messages/logging events requires more and more resources, and thus, becomes expensive to support. Moreover, as amount of tracing/logging performed by the computer system increases, the probability of such tracing/logging adversely impacting performance and stability of the computer system increases as well. Additionally, as more and more data is gathered, analyzing such data becomes problematic simply because of the mere volume of data.
SUMMARY OF THE INVENTION
One embodiment of the invention provides a method for controlling message flow in parallel computing system having multiple compute nodes. The method may generally include assigning a set of compute nodes of the system to a node pool and assigning a message flow control policy to the nodes in the node pool. The message flow control policy may specify logging and/or tracing activities to be performed by an instance of an application running on one or more compute nodes in the node pool. The method may further include initiating execution of the application running on the compute nodes in the node pool and, while executing the application, generating one or more tracing and/or logging messages on the one or more compute nodes according to the message flow control policy.
Another embodiment of the invention includes a computer readable storage medium containing a program which, when executed by a processor, performs an operation for controlling message flow in parallel computing system having multiple compute nodes. The operation may generally include assigning a set of compute nodes of the system to a node pool and assigning a message flow control policy to the nodes in the node pool. The message flow control policy may specify logging and/or tracing activities to be performed by an instance of an application running on one or more compute nodes in the node pool. The operation may further include initiating execution of the application running on the compute nodes in the node pool and, while executing the application, generating one or more tracing and/or logging messages on the one or more compute nodes according to the message flow control policy.
Still another embodiment of the invention includes a parallel computing system. The system may generally include a plurality of compute nodes, each having at least a processor and a memory. Each of compute nodes is configured to execute a parallel computing application. The system may also include a service node having at least a processor, a memory, and a tracing-logging control program for controlling message flow in the parallel computing system. The tracing-logging control program may generally be configured to assign a set of compute nodes to a node pool. A message flow control policy is assigned to each compute node of the node pool. The message flow control policy may specify at least one logging and/or tracing activity to be performed by an instance of an application running on one or more computes node assigned to the node pool. The tracing-logging control program may be further configured to initiate execution of the application on each of the compute nodes in the node pool. The one or more compute node are configured to generate, while executing the application, one or more logging or tracing messages according to the first message flow control policy.
BRIEF DESCRIPTION OF THE DRAWINGS
So that the manner in which the above recited features, advantages and objects of the invention are attained and can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings.
It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are, therefore, not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
FIG. 1 is a block diagram illustrating components of a massively parallel computer system, according to one embodiment of the invention.
FIG. 2 is an illustration of a three-dimensional torus network of system, according to one embodiment of the invention.
FIG. 3 illustrates components of a compute node of the system of FIG. 1, according to one embodiment of the invention.
FIG. 4 is a flowchart illustrating a method for controlling a message flow in a multi-node system, according to one embodiment of the invention.
FIGS. 5A and 5B illustrate a selective grouping of compute nodes in a multi-node system, according to one embodiment of the invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
While providing tracing and logging functionalities in a massively parallel system is highly beneficial for the system, tracing/logging of each possible error/failure consumes significant resources. The more tracing/logging is performed the less resources, such as memory, remains available. Embodiments of the invention enable the system to decrease a message flow, which includes tracing/logging data, across the system without compromising monitoring consistency and operational capability of the system and its applications. This may be done by grouping compute nodes of the system into node pools and processing errors jointly for each node pool according to pre-defined error-control policies.
In the following, reference is made to embodiments of the invention. However, it should be understood that the invention is not limited to specific described embodiments. Instead, any combination of the following features and elements, whether related to different embodiments or not, is contemplated to implement and practice the invention. Furthermore, in various embodiments the invention provides numerous advantages over the prior art. However, although embodiments of the invention may achieve advantages over other possible solutions and/or over the prior art, whether or not a particular advantage is achieved by a given embodiment is not limiting of the invention. Thus, the following aspects, features, embodiments and advantages are merely illustrative and are not considered elements or limitations of the appended claims except where explicitly recited in a claim(s). Likewise, reference to “the invention” shall not be construed as a generalization of any inventive subject matter disclosed herein and shall not be considered to be an element or limitation of the appended claims except where explicitly recited in a claim(s).
One embodiment of the invention is implemented as a program product for use with a computer system. The program(s) of the program product defines functions of the embodiments (including the methods described herein) and can be contained on a variety of computer-readable storage media. Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive) on which information is permanently stored; (ii) writable storage media (e.g., floppy disks within a diskette drive or hard-disk drive) on which alterable information is stored. Such computer-readable storage media, when carrying computer-readable instructions that direct the functions of the invention, are embodiments of the invention. Other media include communications media through which information is conveyed to a computer, such as through a computer or telephone network, including wireless communications networks. The latter embodiment specifically includes transmitting information to/from the Internet and other networks. Such communications media, when carrying computer-readable instructions that direct the functions of the invention, are embodiments of the invention. Broadly, computer-readable storage media and communications media may be referred to herein as computer-readable media.
In general, the routines executed to implement the embodiments of the invention, may be part of an operating system or a specific application, component, program, module, object, or sequence of instructions. The computer program of the invention typically is comprised of a multitude of instructions that will be translated by the native computer into a machine-readable format and hence executable instructions. Also, programs are comprised of variables and data structures that either reside locally to the program or are found in memory or on storage devices. In addition, various programs described hereinafter may be identified based upon the application for which they are implemented in a specific embodiment of the invention. However, it should be appreciated that any particular program nomenclature that follows is used merely for convenience, and thus, the invention should not be limited to use solely in any specific application identified and/or implied by such nomenclature.
Furthermore, while one skilled in the art understands that tracing is not exactly the same as logging, the principles of the invention may be similarly applied to both concepts. Accordingly, though in the present disclosure often only one term is referred, this use of the terminology should not be considered limiting the invention to one particular concept.
FIG. 1 is a block diagram illustrating components of a massively parallel computer system 100, according to one embodiment of the invention. Illustratively, the computer system 100 shows the high-level architecture of an IBM Blue Gene® computer system. However, other parallel computer systems could be used, and the description of a preferred embodiment herein is not intended to limit the invention.
As shown, the computer system 100 includes a compute core 101 having a plurality of compute nodes 112 arranged in a regular array or matrix. The compute nodes 112 perform the useful work performed by the computer system 100. The operation of the computer system 100, including the compute core 101, may be controlled by a service node 102. Various additional processors in front-end nodes 103 may perform auxiliary data processing functions, and file servers 104 provide an interface to data storage devices such as disk based storage 109A, 109B or other I/O operations. A functional network 105 provides the primary data communication path among the compute core 101 and other system components. For example, data stored in storage devices attached to the file servers 104 is loaded and stored to other system components through the functional network 105.
Also as shown, the compute core 101 includes I/O nodes 111 A-C and compute nodes 112A-I. The compute nodes 112 provide the processing capacity of the parallel computer system 100, and are configured to execute applications written for parallel processing. The I/O nodes 111 handle I/O operations on behalf of the compute nodes 112. For example, the I/O node 111 may retrieve data from the file servers 104 requested by one of compute nodes 112. Each I/O node 111 may include a processor and interface hardware that handles I/O operations for a set of N compute nodes 112, the I/O node and its respective set of N compute nodes are referred to as a Pset. The compute core 101 contains M Psets 115A-C, each including a single I/O node 111 and N compute nodes 112, for a total of M×N compute nodes 112. The product M×N can be very large. For example, in one implementation M=1024 (1K) and N=64, for a total of 64K compute nodes.
In general, application programming code and other data input required by the compute core 101 to execute user applications, as well as data output produced by the compute core 101, is communicated over the functional network 105. The compute nodes within a Pset 115 communicate with the corresponding I/O node over a corresponding local I/O tree network 113A-C. Program launch, termination, and I/O requests/operations within each Pset 115 are accomplished using point-to-point messages between the compute nodes 112 and the corresponding I/O node 111. This functionality is provided by a daemon called Control and I/O daemon (CIOD) running on the I/O node 111. The I/O nodes, in turn, are connected to the functional network 105, over which they communicate with I/O devices, attached to file servers 104, or with other system components. Thus, the local I/O tree networks 113 may be viewed logically as extensions of the functional network 105, and like the functional network 105, are used for data I/O, although they are physically separated from the functional network 105.
The service node 102 may be configured to direct the operation of the compute nodes 112 in the compute core 101. In one embodiment, the service node 102 is a computer system that includes a processor (or processors) 121, internal memory 120, and local storage 130. An attached console 107 (i.e., a keyboard, mouse, and display) may be used by a system administrator or similar person to initialize computing jobs on the compute core 101. The service node 102 may also include an internal database which maintains state information for the compute nodes in the compute core 101, and an application which may be configured to, among other things, control the allocation of hardware in the compute core 101, direct the loading of data on the compute nodes 112, migrate process running on one of the compute nodes 112 to another one of the compute nodes 112, and perform diagnostic and maintenance functions.
Illustratively, memory 120 also includes a messaging-control policies holder (MCPH) 122, a tracing/logging controller 123, a tracing/logging parser 124, and a log 125. The tracing/logging controller 123 is configured to group the compute nodes 112 into node pools and to apply the messaging-control policies of MCHP 122, such as error-control policies (described below in greater detail) to the compute nodes 112. In one embodiment, the tracing/logging controller 123 is also configured to analyze messages generated by the compute nodes 112 (e.g., to determine how many messages are generated, what time, by which nodes, and so on) and, based on the results of such analysis, adjust/amend the messaging-control policies of MHPC 122. Such an arrangement allows for dynamic adjustment of the policies to current functioning of the computer system 100, and thus provides for better message flow control.
In one embodiment, the tracing/logging parser 124 may parse content of the messages, e.g., to identify duplicate messages and provide the parsing results to the tracing/logging controller 123, which in turn may amend the policies of MCHP 122 applied to the node pools. The log 125 is configured to store tracing messages and/or logging events, such as error messages, and may be used by both, the tracing/logging controller 123 and the tracing/logging parser 124. It should be noted that not every embodiment includes the tracing/logging parser 124. For example, the tracing/logging controller 123 may also be configured to perform the functions of the tracing/logging parser described above. In yet another, embodiment messages content simply is not parsed. Moreover, the tracing/logging controller 123 and parser 124 need not reside on the service node 102. Instead, controller 123 and parser 124 may reside on one or more of the compute nodes.
In one embodiment, the service node 102 communicates control and state information to the nodes of the compute core 101 over a control system network 106. As shown, the control network 106 is coupled to a set of hardware controllers 108A-C. Each hardware controller communicates with nodes of a respective Pset 115 over a corresponding local hardware control network 114A-C. The hardware controllers 108 and local hardware control networks 114 are logically an extension of the control system network 106, although physically separate. In one embodiment, the control system network 106 may include a JTAG (Joint Test Action Group) network, configured to provide a hardware monitoring facility. As is known, JTAG is a standard for providing external test access to integrated circuits serially, via a four- or five-pin external interface. The JTAG standard has been adopted as an IEEE standard. Within a Blue Gene system, the JTAG network may be used to send performance counter data to the service node 102 in real-time. That is, while an application is running on the compute core 101, network performance and/or network state data may be gathered and transmitted to service node 102 without affecting the performance of that application. Of course, one of ordinary skill in the art will recognize that other hardware monitoring facilities may be used.
In addition to the service node 102, the front-end nodes 103 provide computer systems used to perform auxiliary functions which, for efficiency or otherwise, are best performed outside the compute core 101. Functions which involve substantial I/O operations are generally performed in the front-end nodes 103. For example, interactive data input, application code editing, or other user interface functions are generally handled by the front-end nodes 103, as is application code compilation or application debugging. The front-end nodes 103 are also connected to the functional network 105 and may communicate with the file servers 104.
As stated, in a massively parallel computer system 100, compute nodes 112 may be logically arranged in a three-dimensional torus, where each compute node 112 may be identified using an x, y and z coordinate.
FIG. 2 is a conceptual illustration of a three-dimensional torus network of a computer system 100, according to one embodiment of the invention. More specifically, FIG. 2 illustrates a 4×4×4 torus 201 of compute nodes, in which the interior nodes are omitted for clarity. Although FIG. 2 shows a 4×4×4 torus having 64 nodes, it will be understood that the actual number of compute nodes in a parallel computing system is typically much larger. For example, a Blue Gene/L system may be configured with 65,536 compute nodes 112 along with and an additional 1024 I/O nodes 111. Illustratively, each compute node 112 in the torus 201 includes a set of six node-to-node communication links 202A-F which allows each compute nodes in the torus 201 to communicate with its six immediate neighbors, two nodes in each of the x, y and z coordinate dimensions.
As used herein, the term “torus” includes any regular pattern of nodes and inter-nodal data communications paths in more than one dimension, such that each node has a defined set of neighbors, and for any given node, it is possible to determine the set of neighbors of that node. A “neighbor” of a given node is any node which is linked to the given node by a direct inter-nodal data communications path. That is, a path which does not have to traverse another node. The compute nodes may be linked in a three-dimensional torus 201, as shown in FIG. 2, but may also be configured to have more or fewer dimensions. Also, it is not necessarily the case that a given node's neighbors are the physically closest nodes to the given node, although it is generally desirable to arrange the nodes in such a manner, insofar as possible.
In one embodiment, the compute nodes in any one of the x, y, or z dimensions form a torus in that dimension because the point-to-point communication links logically wrap around. For example, this is represented in FIG. 2 by links 202D, 202E, and 202F which wrap around from a compute node 203 to other end of the compute core 201 in each of the x, y and z dimensions. Thus, although the node 203 appears to be at a “corner” of the torus, node-to-node links 202A-F link the node 203 to the nodes 204, 205, and 206, in the x, y, and Z dimensions of the torus 201.
FIG. 3 illustrates components of a compute node 112 of the computer system 100 of FIG. 1, according to one embodiment of the invention. As shown, the compute node 112 includes processor cores 301A and 301B, each having an instruction address register 306A and 306B. The compute node 112 also includes memory 302 used by both processor cores 301; an external control interface 303 which is coupled to a local hardware control network 114 (e.g., the control system network 106); an external data communications interface 304 which is coupled to the corresponding local I/O tree network 113 and the corresponding six node-to-node links 202 of the torus network 201; and includes monitoring and control logic 305 which receives and responds to control commands received through external control interface 303. The monitoring and control logic 305 may access the processor cores 301 and locations in the memory 302 on behalf of the service node 102 to read (or in some cases alter) the operational state of the compute node 112. In one embodiment, each compute node 112 may be physically implemented as a single integrated circuit.
As described, the functional network 105 may service many I/O nodes 111, and each I/O node 111 is shared by a group of compute nodes 112 (i.e., a Pset). Thus, it is apparent that the I/O resources of the parallel computer system 100 are relatively sparse when compared to computing resources. Although it is a general purpose computing machine, the parallel computer system 100 is designed for maximum efficiency in applications which are computationally intense.
As shown in FIG. 3, the memory 302 stores an operating system image 311. The operating system image 311 provides a copy of a simplified-function operating system running on the compute node 112, referred to as a compute node kernel (CNK). CNK 311 provides a minimal set of functions required to support operation of the compute node 112.
One functionality provided by the CNK 311 is to forwards system calls of the compute node 112 for service. A separate process running on the corresponding I/O node 111, namely CIOD, services system calls on behalf of CNK 311. In particular, I/O system requests initiated by a user application 312 running on the compute node 112 (e.g., open, close, read, write, etc.) are trapped by CNK 311 and shipped via point-to-point messages to CIOD of its corresponding I/O node 111. CIOD also supports a service connection providing a trace facility and status reporting for the compute nodes 112. The trace output allows seeing the flow of control through the running CIOD. The status reporting allows seeing current states of various objects maintained by CIOD and the compute nodes 112.
In one embodiment, a tracing/logging component 313 may reside in the memory 302. The tracing/logging controller 123 of the service node 102 directs the tracing/logging component 313 to implement the messaging-control policies of MCHP 122 (such as error-control polices) corresponding to the compute node 112. For example, in one embodiment, the tracing/logging component 313 may disable a certain error processing. For example, application 312 may be configured with multiple logging levels or tracing configurations, (e.g., error processing of errors having severity level ranging from 1-5, where 1 represents a minimal level of logging and 5 represents a maximum verbosity in logging; error processing of errors having severity level ranging from 1-5, where 1 represents least critical errors, such as correctable errors, and 5 represents most critical errors, such as fatal errors). In such a case, the tracing/logging controller 123 may set different logging levels for multiple nodes running a respective copy of application 312. This allows for at least some nodes to execute the application 312 with a great deal of logging activity, while other nodes perform only a minimal degree of logging. Given that each node may execute a copy of the same application, the logging on the node set to a maximal logging level may provide logging data representative of logging on all the applications. Similarly, the tracing/logging controller 123 may activate tracing features for only a few nodes running the same application and use the information from those nodes as being representative of overall application performance. An alternative scenario includes assigning the same level of tracing and/or logging to multiple compute nodes, but doing so for different components of an application 312. Doing so allows the cost of debugging/logging functions to be distributed across multiple compute nodes. In another embodiment, the tracing/logging component 313 may intercept messages of a certain type (e.g., info messages) from the compute node 112, so messages of this type are not transmitted across the computer system 100.
Additional examples of messaging-control policies are discussed in reference to FIGS. 4, 5A, and 5B. FIG. 4 illustrates a method 400 for controlling message flow across the computer system 100, according to one embodiment of the invention. As shown, the method 400 begins at step 405. At step 410, the compute nodes of the computer system 100 are grouped into node pools, where each node pool contains a plurality of compute nodes. Such grouping is performed in such a manner that errors logged/traced by the applications running on a node in a given node pool are analyzed together. This allows modifying error processing for the compute nodes within the node pool in such a way that necessary and/or representative error data continues to be generated and analyzed, while duplicate or unimportant error data may be omitted. Consequently, the resources of the computer system 100 are conserved and may be used by the system for other purposes.
Typically, the compute nodes assigned to one node pool execute the same user application. However, the compute nodes may run different user applications, not be connected to each other. Furthermore, in one embodiment, some of the compute nodes may be assigned to several node pools, while other compute nodes are not assigned to any of the node pools.
At steps 415 and 420, one or more error-control policies are assigned and applied respectively to the node pools. In general, an error-control policy defines tracing characteristics of the nodes within a node pool. For example, an error-control policy may define a type of error processing (e.g., INFO, ERROR, CONFIG, and so on), error severity level (e.g., 1-5), specific error (e.g., such as error specific to a particular user application running on the compute nodes 112 assigned to the node pool).
The error-control policy may further define how the defined type of error processing should be used in a particular node pool. For example, the error-control policy may specify that error processing should be disabled/turned on for errors of a certain type, certain error severity level, or specific error (e.g., disable error processing of errors having an error severity level of 2). The error-control policy may further specify whether error processing should be disabled only for one node, all nodes, or a certain number of nodes in the node pool (e.g., disable error processing of errors having severity level of 2 for all compute nodes in the node pool except one; disable error processing of the “Info” type errors for every compute node in the node pool, turn on error processing of errors of any kind for a certain compute node in the node pool; and so on).
In another embodiment, the error-control policy may specify that no error messages should be transmitted from nodes of the node pool, though the error messages continue to be generated. Because the messages are not transmitted, resources of the computer system 100 are conserved. Optionally, such messages may be combined and locally logged, so they may be accessed when and if needed.
Typically, the error-control policies applied to the node pools differ between the node pools as doing so allows error processing/logging to be distributed across compute nodes 112. However, this is not necessarily the case. For example, two node pools including compute nodes 112 each running a different user application may be assigned similar error-control policies (such as turning off all error processing for each compute node 112 except a subset of one or more nodes in the pool).
Further, in one embodiment, an error-control policy includes only one condition (such as turn off an error processing of a certain kind for certain nodes in a node pool), while multiple conditions (such as turning off two kinds of error processing) may be applied to the same set of the compute nodes by assigning that set of compute nodes to multiple pools. In such a case, each node pool may be assigned a different error-control for the set of compute nodes. Alternatively, one node pool may be used for each set of the compute nodes 112 where the corresponding error-control policy includes multiple conditions applicable to that set of the compute nodes.
Optionally, after the error-control policies have been applied to the node pools (step 415), the error-message flow of the computer system 100 may be analyzed (step 420) to determine whether any of the error-control policies need to be amended and/or any compute nodes should be assigned to new node pools. For example, if it is determined that none of the error-messages describing errors of a kind described by an error-control policy are generated from a node pool to which the error-control policy is assigned, such an error-control policy may be amended (step 435). One possible amendment of an error-control policy is changing an error condition defined by the error-control policy (e.g., changing the error severity level from 1 to 2; changing the error type from “Info” to “Config;” and so on). Another possible error-control policy amendment is changing the compute node(s) to which the policy is applied (e.g., turning error processing on one compute node and disabling the same kind of error processing on another compute node). It should be noted that when an error-control policy has been amended, tracing characteristics of the compute nodes assigned to a node pool having this error-control policy change to correspond to the amended error-control policy.
For similar reasons, it may be beneficial to switch compute nodes between the node pools. For example, if based on the analysis of the error-message flow it is determined that a compute node in one node pool generates error of the same kind as compute nodes in another node pool, such a compute node may be re-assigned to the node pool where the compute nodes generate similar errors. When a compute node is assigned to a new pool, its tracing characteristic change to correspond to the error-control policy assigned to that new pool.
It should be noted that the described error-control policy amendments or node switching are not necessarily based on the results of the error-message flow analysis. Changes in the computer system 100 (e.g., new user application installed on some of the compute nodes) may also be used to amend the error-control policies or assign nodes to new node pools, even when the error-message flow has not been analyzed.
In step 440, the content of an error-message (e.g., an error id and description) may optionally be used to determine whether duplicate error messages are being generated or transmitted across the computer system 100. When duplicate messages are identified, certain measures may be taken to avoid processing such messages unnecessarily. For example, in one embodiment the duplicate messages are not transmitted over the computer system 100, but instead collected and logged locally. Later, a condensed summary of the error messages may be generated. Such a summary may include the duplicate error-message content and, optionally, description of the compute nodes that have caused generation of the duplicate error-messages.
In another embodiment, discovery of the duplicate messages may cause error-control policies to be modified or a node being assigned to another node pool. For example, the compute nodes generating duplicate error-messages may be assigned to the same node pool. Then, one compute node in the node pool may be selected and an error-control policy may be created. This error-control policy would turn off error processing causing the duplicate messages to be generated for every compute node in the node pool except for the previously selected compute node. The method 400 ends at step 445.
It should be noted that it is not necessary to perform all of the above-described steps in the order named. Furthermore, not all of the described steps are necessary for the described method to operate. Which steps should be used, in what order the steps should be performed, and whether some steps should be repeated more often than other steps is determined, based on, for example, specific qualities of the computer system 100, available resources, user applications running on the compute nodes 112, and so on. It should further noted, that though the description above primarily focuses on error-messages, the invention is not limited to processing of error-messages. The principles described above may similarly be applied to other types of messages transmitted across the computer system 100. For example, logging messages indicating processing activity by an application running the compute nodes. In such a case, different nodes may be set to different logging levels, or different logging activity may be performed by different pools of nodes, effectively distributing the resource cost of logging across the node pools.
FIGS. 5A and 5B illustrate a selective grouping of compute nodes 112 in the parallel computer system 100, according to one embodiment of the invention. Specifically, FIGS. 5A and 5B illustrate 16 compute nodes of the computer system 100, namely compute nodes 0 through 15 which are assigned to three node pools; namely node pools 510, 520, and 530. A messaging-control policy applied to the node pool 510 specifies that only tracing messages having an “info” type should be generated (and/or reported) by the nodes of the pool 510. A messaging-control policy applied to the node pool 520 provides that only a certain kind of error messages may be generated by the compute nodes of the node pool 520; namely error messages having a hypothetical error severity level of “2.” An error-control policy applied to the node pool 530 specifies that only one compute node in the node pool 530; namely, node 11, should perform generate and or report error messages (e.g., logging/tracing messages) while the error processing for other compute nodes in the node pool 530 is disabled.
As shown in FIGS. 5A and 5B, the node pool 520 includes nodes 10, 11, 14, and 15. However, the node pools 510 and 530 differ between FIGS. 5A and 5B. Specifically, nodes 0 and 1 are included in the node pool 510 in FIG. 5A and in the node pool 530 in FIG. 5B. As described above, in certain circumstances it is advantageous for a multi-node system, such as the computer system 100) to switch compute nodes among different node pools. Thus, in this example, FIGS. 5A and 5B show that nodes 0 and 1 have been re-assigned from node pool 510 to the node pool 530 in FIG. 5B. Note, however, as soon as the nodes 0 and 1 are switched to the node pool 530, the policies applied to these nodes switches accordingly, and thus, tracing characteristics of the compute nodes 0 and 1 change to correspond to the messaging-control policy of the node pool 530. Thus, in this example, while in FIG. 5A, any info messages generated by the compute node 0 are logged/traced and reported. In contrast, in FIG. 5B, node 0 only generates an error message having the severity error level of 2.
Advantageously, as described herein, embodiments of the invention enable controlling a message flow across multiple compute nodes of a highly-parallel system. For example, by grouping the compute nodes into node pools and allowing a certain kind of error of processing only for one node in a node pool while disabling such error processing for the other nodes in the node pool, message flow across the system may be significantly decreased without compromising monitoring consistency and operational capability of the system and its applications. Further, in one embodiment, upon determining that duplicate messages are generated, the duplicate messages are prevented from transmitting across the system and a condensed summary of the duplicate messages is provided instead. Doing so frees memory and processing resources of the system and reduces the amount of the system monitoring.
While the foregoing is directed to embodiments of the invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow. Furthermore, while the invention has been described using a Blue Gene/L parallel computing system, the Blue Gene/L system is merely an example. This example should not be considered limiting the scope of the invention, for the principles of the invention described herein are similarly applicable and equally effective in any multi-node computing system or environment.

Claims (25)

What is claimed is:
1. A computer-implemented method for controlling message flow in a parallel computing system having a plurality of compute nodes, the method comprising:
assigning a first set of compute nodes to a first node pool;
assigning a first message flow control policy to at least two compute nodes of the first node pool, wherein the first message flow control policy specifies at least one logging activity to be performed by an instance of an application running on each of the at least two compute nodes of the first node pool, and wherein subsequent modifications to the assigned first message flow control policy affect one or more of the at least one logging activities performed by each instance of the application running on the at least two compute nodes;
initiating execution of the application on each of the compute nodes in the first node pool;
while executing the application on the at least two compute nodes of the first node pool, generating a plurality of logging messages according to the first message flow control policy; and
upon determining that two or more of the at least two compute nodes of the first node pool are generating duplicate error messages based on content of the plurality of logging messages:
assigning a selected one of the two or more compute nodes to a second node pool; and
assigning a second message flow control policy corresponding to the second node pool to the selected compute node, wherein the second message flow control policy is distinct from the first message flow control policy, and wherein logging activity performed by the instance of the application running on the selected compute node is controlled by the second message flow control policy rather than the first message flow control policy.
2. The method of claim 1, further comprising:
transmitting, by the first compute node, the one or more generated messages to a service node; and
storing, by the service node, each generated message.
3. The method of claim 1, wherein the message flow control policy specifies logging activity to be performed by a plurality of compute nodes assigned to the first node pool, and wherein a logging activity level is assigned to each instance of the application.
4. The method of claim 3, wherein the logging activity level specifies a level of verbosity for generating log messages while executing the instance of the application on each respective compute node.
5. The method of claim 3, wherein the message flow control policy specifies logging activity to be performed by a plurality of compute nodes assigned to the first node pool, and wherein multiple sets of compute nodes of the first node pool are each assigned a respective logging activity level.
6. The method of claim 1, wherein the message flow control policy specifies logging activity to be performed by the instance of the application running on the compute nodes assigned to the first node pool, and wherein a first logging activity level is assigned to a first instance of the application and a second logging activity level is assigned to at least a second instance of the application, wherein the first and second logging activity levels are different from one another.
7. The method of claim 1, wherein the message flow control policy specifies logging activity to be performed by a plurality of compute nodes assigned to the first node pool and specifies that the first instance of the application executing on the first compute node should generate log messages relative to a first type of event of the application and a second instance of the application should generate log messages relative to a second type of event.
8. The method of claim 1, wherein the message flow control policy specifies to generate a logging message for a first occurrence of a specified event and to not generate further logging messages for additional occurrences of the specified event.
9. The method of claim 1, further comprising:
assigning a second set of compute nodes to the second node pool, wherein the second message flow control policy is assigned to each compute node of the second node pool, and wherein the second message flow control policy specifies at least one of logging and/or tracing activity to be performed by an instance of the application running on at least one compute node assigned to the second node pool.
10. The method of claim 1, wherein each compute node in the at least two compute nodes includes a respective compute node kernel (CNK) and a respective tracing/logging application, and wherein the plurality of logging messages are generated by the tracing/logging application, rather than by the CNK, according to a portion of the first message flow control policy specific to the respective compute node.
11. The method of claim 10, wherein assigning the second message flow control policy corresponding to the second node pool to the selected compute node is performed without modifying the CNK of the selected compute node.
12. The method of claim 1, wherein the first message flow control policy specifies that the at least one logging activity is disabled for errors of a first error type, for one or more compute nodes of the first node pool, wherein the at least one logging activity for the first error type remains enabled for the at least two compute nodes of the first node pool.
13. The method of claim 1, wherein the content of the plurality of logging messages comprises a respective error identifier and a description for each of the plurality of logging messages, and wherein the steps of assigning the selected compute node to the second node pool and assigning the second message flow control policy corresponding to the second node pool to the selected compute node are performed without requiring user interaction.
14. The method of claim 1, further comprising:
analyzing the plurality of logging messages to determine that a first compute node of the at least two compute nodes is generating logging messages that are sufficiently similar to a set of logging messages generated by compute nodes assigned to a third node pool;
assigning, without requiring user interaction, the first compute node to the third node pool, rather than the first node pool; and
assigning a third message flow control policy corresponding to the third node pool to the first compute node, wherein the third message flow control policy is distinct from both the first message flow control policy and the second message flow control policy, and wherein logging activity performed by the instance of the application running on the first compute node is controlled by the third message flow control policy rather than either the first message flow control policy or the second message flow control policy.
15. A non-transitory computer-readable medium containing a program which, when executed by a processor, performs an operation for controlling message flow in a parallel computing system having a plurality of compute nodes, the operation comprising:
assigning a first set of compute nodes to a first node pool;
assigning a first message flow control policy to at least two compute nodes of the first node pool, wherein the first message flow control policy specifies at least one logging activity to be performed by an instance of an application running on each of the at least two compute nodes of the first node pool, and wherein subsequent modifications to the assigned first message flow control policy affect one or more of the at least one logging activities performed by each instance of the application running on the at least two compute nodes;
initiating execution of the application on each of the compute nodes in the first node pool;
while executing the application on the at least two compute nodes of the first node pool, generating a plurality of logging messages according to the first message flow control policy; and
upon determining that two or more of the at least two compute nodes of the first node pool are generating duplicate error messages based on content of the plurality of logging messages:
assigning a selected one of the two or more compute nodes to a second node pool; and
assigning a second message flow control policy corresponding to the second node pool to the selected compute node, wherein the second message flow control policy is distinct from the first message flow control policy, and wherein logging activity performed by the instance of the application running on the selected compute node is controlled by the second message flow control policy rather than the first message flow control policy.
16. The non-transitory computer-readable medium of claim 15, wherein the operations further comprises:
transmitting, by the first compute node, the one or more generated messages to a service node; and
storing, by the service node, each generated message.
17. The non-transitory computer-readable medium of claim 15, wherein the message flow control policy specifies logging activity to be performed by a plurality of compute nodes assigned to the first node pool, and wherein a logging activity level is assigned to each instance of the application.
18. The non-transitory computer-readable medium of claim 17, wherein the logging activity level specifies a level of verbosity for generating log messages while executing the instance of the application on each respective compute node.
19. The non-transitory computer-readable medium of claim 17, wherein the message flow control policy specifies logging activity to be performed by a plurality of compute nodes assigned to the first node pool, and wherein multiple sets of compute nodes of the first node pool are each assigned a respective logging activity level.
20. The non-transitory computer-readable medium of claim 15, wherein the message flow control policy specifies logging activity to be performed by the instance of the application running on the compute nodes assigned to the first node pool, and wherein a first logging activity level is assigned to a first instance of the application and a second logging activity level is assigned to at least a second instance of the application, wherein the first and second logging activity levels are different from one another.
21. The non-transitory computer-readable medium of claim 15, wherein the message flow control policy specifies logging activity to be performed by a plurality of compute nodes assigned to the first node pool and specifies that the first instance of the application executing on the first compute node should generate log messages relative to a first type of event of the application and a second instance of the application should generate log messages relative to a second type of event.
22. The non-transitory computer-readable medium of claim 15, wherein the operation further comprises:
assigning a second set of compute nodes to the second node pool, wherein the second message flow control policy is assigned to each compute node of the second node pool, and wherein the second message flow control policy specifies at least one of logging and/or tracing activity to be performed by an instance of the application running on at least one compute node assigned to the second node pool.
23. A parallel computing system, comprising:
a plurality of compute nodes, each having at least a processor and a memory, wherein the plurality of compute nodes is configured to execute a parallel computing task; and
a service node having at least a processor and a memory and a tracing-logging control program for controlling message flow in the parallel computing system, wherein the tracing-logging control program is configured to:
assign a first set of compute nodes to a first node pool;
assign a first message flow control policy to at least two compute nodes of the first node pool, wherein the first message flow control policy specifies at least one logging activity to be performed by an instance of an application running on each of the at least two compute nodes of the first node pool, and wherein subsequent modifications to the assigned first message flow control policy affect one or more of the at least one logging activities performed by each instance of the application running on the at least two compute nodes;
initiate execution of the application on each of the compute nodes in the first node pool;
while executing the application on the at least two compute nodes of the first node pool, generate a plurality of logging messages according to the first message flow control policy; and
upon determining that two or more of the at least two compute nodes of the first node pool are generating duplicate error messages based on content of the plurality of logging messages:
assign a selected one of the two or more compute nodes to a second node pool; and
assign a second message flow control policy corresponding to the second node pool to the selected compute node, wherein the second message flow control policy is distinct from the first message flow control policy, and wherein logging activity performed by the instance of the application running on the selected compute node is controlled by the second message flow control policy rather than the first message flow control policy.
24. The parallel computing system of claim 23, wherein the message flow control policy specifies logging activity to be performed by a plurality of compute nodes assigned to the first node pool, and wherein multiple sets of compute nodes of the first node pool are each assigned a respective logging activity level.
25. The parallel computing system of claim 23, wherein the tracing-logging control program is further configured to:
assign a second set of compute nodes to the second node pool, wherein the second message flow control policy is assigned to each compute node of the second node pool, and wherein the second message flow control policy specifies at least one of logging and/or tracing activity to be performed by an instance of the application running on at least one compute node assigned to the second node pool.
US12/144,783 2008-06-24 2008-06-24 Message flow control in a multi-node computer system Expired - Fee Related US9514023B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/144,783 US9514023B2 (en) 2008-06-24 2008-06-24 Message flow control in a multi-node computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/144,783 US9514023B2 (en) 2008-06-24 2008-06-24 Message flow control in a multi-node computer system

Publications (2)

Publication Number Publication Date
US20090319621A1 US20090319621A1 (en) 2009-12-24
US9514023B2 true US9514023B2 (en) 2016-12-06

Family

ID=41432379

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/144,783 Expired - Fee Related US9514023B2 (en) 2008-06-24 2008-06-24 Message flow control in a multi-node computer system

Country Status (1)

Country Link
US (1) US9514023B2 (en)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8161480B2 (en) 2007-05-29 2012-04-17 International Business Machines Corporation Performing an allreduce operation using shared memory
US8422402B2 (en) 2008-04-01 2013-04-16 International Business Machines Corporation Broadcasting a message in a parallel computer
US9514023B2 (en) * 2008-06-24 2016-12-06 International Business Machines Corporation Message flow control in a multi-node computer system
US8281053B2 (en) 2008-07-21 2012-10-02 International Business Machines Corporation Performing an all-to-all data exchange on a plurality of data buffers by performing swap operations
US8065565B2 (en) * 2008-10-03 2011-11-22 Microsoft Corporation Statistical debugging using paths and adaptive profiling
US8418002B2 (en) * 2009-11-17 2013-04-09 Ca, Inc. Service modeling impact analysis
US9424087B2 (en) 2010-04-29 2016-08-23 International Business Machines Corporation Optimizing collective operations
US8949577B2 (en) 2010-05-28 2015-02-03 International Business Machines Corporation Performing a deterministic reduction operation in a parallel computer
US8776081B2 (en) 2010-09-14 2014-07-08 International Business Machines Corporation Send-side matching of data communications messages
US8566841B2 (en) 2010-11-10 2013-10-22 International Business Machines Corporation Processing communications events in parallel active messaging interface by awakening thread from wait state
US20120331270A1 (en) * 2011-06-22 2012-12-27 International Business Machines Corporation Compressing Result Data For A Compute Node In A Parallel Computer
US8893083B2 (en) 2011-08-09 2014-11-18 International Business Machines Coporation Collective operation protocol selection in a parallel computer
US8910178B2 (en) 2011-08-10 2014-12-09 International Business Machines Corporation Performing a global barrier operation in a parallel computer
US8667501B2 (en) 2011-08-10 2014-03-04 International Business Machines Corporation Performing a local barrier operation
WO2013095470A1 (en) * 2011-12-21 2013-06-27 Intel Corporation Error framework for a microprocessor and system
JP5825120B2 (en) * 2012-01-27 2015-12-02 富士通株式会社 Control system, arithmetic processing unit, and log delivery method
US8706847B2 (en) 2012-02-09 2014-04-22 International Business Machines Corporation Initiating a collective operation in a parallel computer
US9495135B2 (en) 2012-02-09 2016-11-15 International Business Machines Corporation Developing collective operations for a parallel computer
US9497095B2 (en) * 2012-03-22 2016-11-15 International Business Machines Corporation Dynamic control over tracing of messages received by a message broker
US9207969B2 (en) * 2013-01-25 2015-12-08 Microsoft Technology Licensing, Llc Parallel tracing for performance and detail
US9021447B2 (en) * 2013-02-12 2015-04-28 Concurix Corporation Application tracing by distributed objectives
US9244869B1 (en) * 2013-06-30 2016-01-26 Emc Corporation Asynchronous checkpointing with message passing to burst buffers
US9244811B1 (en) * 2013-12-20 2016-01-26 Emc Corporation System and method for smart framework for network backup software debugging
US9703788B1 (en) * 2014-03-31 2017-07-11 EMC IP Holding Company LLC Distributed metadata in a high performance computing environment
CN110134573A (en) * 2019-04-12 2019-08-16 平安普惠企业管理有限公司 Make the continuous race control method of number, device, computer equipment and storage medium

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5241652A (en) * 1989-06-08 1993-08-31 Digital Equipment Corporation System for performing rule partitioning in a rete network
US6182130B1 (en) * 1991-03-18 2001-01-30 Echelon Corporation Method for enhancing the performance of a network
US20030074607A1 (en) * 2001-05-11 2003-04-17 Brundridge Michael A. Dynamic display of personal computer support information
US20040103218A1 (en) * 2001-02-24 2004-05-27 Blumrich Matthias A Novel massively parallel supercomputer
US20040139194A1 (en) * 2003-01-10 2004-07-15 Narayani Naganathan System and method of measuring and monitoring network services availablility
US20040181709A1 (en) * 2003-03-13 2004-09-16 Sun Microsystems, Inc. Method, system, and article of manufacture for fault determination
US20040210320A1 (en) * 2002-06-11 2004-10-21 Pandya Ashish A. Runtime adaptable protocol processor
US20050037733A1 (en) * 2003-08-12 2005-02-17 3E Technologies, International, Inc. Method and system for wireless intrusion detection prevention and security management
US7032119B2 (en) * 2000-09-27 2006-04-18 Amphus, Inc. Dynamic power and workload management for multi-server system
US20060176826A1 (en) * 2005-02-07 2006-08-10 International Business Machines Corporation All-to-all sequenced fault detection system
US20060195896A1 (en) * 2004-12-22 2006-08-31 Wake Forest University Method, systems, and computer program products for implementing function-parallel network firewall
US20080243848A1 (en) * 2007-03-28 2008-10-02 Oracle International Corporation User specific logs in multi-user applications
US7457236B2 (en) * 2004-04-22 2008-11-25 National Cheng Kung University Method for providing fault-tolerant application cluster service
US7461130B1 (en) * 2004-11-24 2008-12-02 Sun Microsystems, Inc. Method and apparatus for self-organizing node groups on a network
US20090049428A1 (en) * 2007-08-16 2009-02-19 Microsoft Corporation Error tracing with context history
US20090287628A1 (en) * 2008-05-15 2009-11-19 Exegy Incorporated Method and System for Accelerated Stream Processing
US20090319621A1 (en) * 2008-06-24 2009-12-24 Barsness Eric L Message Flow Control in a Multi-Node Computer System
US7707288B2 (en) * 2005-01-06 2010-04-27 International Business Machines Corporation Automatically building a locally managed virtual node grouping to handle a grid job requiring a degree of resource parallelism within a grid environment

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5241652A (en) * 1989-06-08 1993-08-31 Digital Equipment Corporation System for performing rule partitioning in a rete network
US6182130B1 (en) * 1991-03-18 2001-01-30 Echelon Corporation Method for enhancing the performance of a network
US7032119B2 (en) * 2000-09-27 2006-04-18 Amphus, Inc. Dynamic power and workload management for multi-server system
US20040103218A1 (en) * 2001-02-24 2004-05-27 Blumrich Matthias A Novel massively parallel supercomputer
US20030074607A1 (en) * 2001-05-11 2003-04-17 Brundridge Michael A. Dynamic display of personal computer support information
US20040210320A1 (en) * 2002-06-11 2004-10-21 Pandya Ashish A. Runtime adaptable protocol processor
US20040139194A1 (en) * 2003-01-10 2004-07-15 Narayani Naganathan System and method of measuring and monitoring network services availablility
US20040181709A1 (en) * 2003-03-13 2004-09-16 Sun Microsystems, Inc. Method, system, and article of manufacture for fault determination
US20050037733A1 (en) * 2003-08-12 2005-02-17 3E Technologies, International, Inc. Method and system for wireless intrusion detection prevention and security management
US7295831B2 (en) * 2003-08-12 2007-11-13 3E Technologies International, Inc. Method and system for wireless intrusion detection prevention and security management
US7457236B2 (en) * 2004-04-22 2008-11-25 National Cheng Kung University Method for providing fault-tolerant application cluster service
US7461130B1 (en) * 2004-11-24 2008-12-02 Sun Microsystems, Inc. Method and apparatus for self-organizing node groups on a network
US20060195896A1 (en) * 2004-12-22 2006-08-31 Wake Forest University Method, systems, and computer program products for implementing function-parallel network firewall
US7707288B2 (en) * 2005-01-06 2010-04-27 International Business Machines Corporation Automatically building a locally managed virtual node grouping to handle a grid job requiring a degree of resource parallelism within a grid environment
US20060176826A1 (en) * 2005-02-07 2006-08-10 International Business Machines Corporation All-to-all sequenced fault detection system
US20080243848A1 (en) * 2007-03-28 2008-10-02 Oracle International Corporation User specific logs in multi-user applications
US20090049428A1 (en) * 2007-08-16 2009-02-19 Microsoft Corporation Error tracing with context history
US20090287628A1 (en) * 2008-05-15 2009-11-19 Exegy Incorporated Method and System for Accelerated Stream Processing
US20090319621A1 (en) * 2008-06-24 2009-12-24 Barsness Eric L Message Flow Control in a Multi-Node Computer System

Also Published As

Publication number Publication date
US20090319621A1 (en) 2009-12-24

Similar Documents

Publication Publication Date Title
US9514023B2 (en) Message flow control in a multi-node computer system
US8370844B2 (en) Mechanism for process migration on a massively parallel computer
Sultana et al. Flightplan: Dataplane disaggregation and placement for p4 programs
US8214814B2 (en) Sharing compiler optimizations in a multi-node system
US8095512B2 (en) Managing database resources used for optimizing query execution on a parallel computer system
US7844620B2 (en) Real time data replication for query execution in a massively parallel computer
US8364908B2 (en) Migrating program objects in a multi-node computer system
US8261249B2 (en) Distributed schemes for deploying an application in a large parallel system
US8423987B2 (en) Routing performance analysis and optimization within a massively parallel computer
US10379990B2 (en) Multi-dimensional selective tracing
US20080082644A1 (en) Distributed parallel computing
WO2009109478A1 (en) Virtual-to-physical network mapping in a parallel computing system with multiple networks
US11675682B2 (en) Agent profiler to monitor activities and performance of software agents
US8209299B2 (en) Selectively generating program objects on remote node of a multi-node computer system
US10185647B2 (en) Debugging remote vertex code on test machine
US20100085871A1 (en) Resource leak recovery in a multi-node computer system
US7954012B2 (en) Hierarchical debug information collection
CN1859229A (en) Network processor and method for monitoring network processor
US8203937B2 (en) Global detection of resource leaks in a multi-node computer system
Simakov et al. Application kernels: HPC resources performance monitoring and variance analysis
CN115755570A (en) Scheduling arbitration method and device of multi-redundancy heterogeneous scheduling arbitrator
WO2022204676A1 (en) Systems and methods for low latency stateful threat detection and mitigation
US20080259916A1 (en) Opportunistic queueing injection strategy for network load balancing
CN112181759A (en) Method for monitoring micro-service performance and diagnosing abnormity
US7634684B2 (en) Intelligent configuration for restarting failed application server instances

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BARSNESS, ERIC L;DARRINGTON, DAVID L;PETERS, AMANDA;AND OTHERS;SIGNING DATES FROM 20080613 TO 20080618;REEL/FRAME:021141/0131

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BARSNESS, ERIC L;DARRINGTON, DAVID L;PETERS, AMANDA;AND OTHERS;REEL/FRAME:021141/0131;SIGNING DATES FROM 20080613 TO 20080618

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20201206